Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Security teams facing PCI DSS audit failures around eSkimming controls will get clear guidance on how to close gaps quickly and build a defensible program. This webinar focuses on establishing effective eSkimming protections for payment pages, with practical steps that address what auditors look for, including script visibility, approval, monitoring, detection, and evidence generation.
The session outlines a realistic approach to standing up an operational eSkimming security program in days, not months. It covers how to inventory and authorize scripts, detect unauthorized changes, respond to alerts, and produce audit ready reporting without heavy manual effort. Attendees will also learn how to structure ownership and processes so controls remain effective after the audit, helping organizations move from remediation to long term compliance confidence.
1 week from now
Remote access security is breaking down as traditional VPNs become a common entry point for attackers. This webinar examines why SSL VPNs are increasingly exploited and how they enable credential theft, lateral movement, and data exposure in modern networks.
WatchGuard experts explain how a zero trust access model removes these risks while improving performance and simplicity for hybrid environments. Attendees will gain insight into the true cost of maintaining VPNs and learn how MSPs are replacing them with faster, safer zero trust access services that better protect users and infrastructure.
1 week from now
Attackers are increasingly targeting Entra ID data to disrupt access, compromise identities, and cripple business operations. This webinar focuses on how corruption or deletion of Entra ID data can weaken an organization’s ability to operate and why many IT teams underestimate this risk. The discussion outlines current threat activity aimed specifically at identity data and the impact these attacks can have across cloud environments.
The session explains why stronger network security combined with modern, cloud based backup for Entra ID is critical for cyber resilience. Attendees will gain clear insight into how these attacks work and what practical steps organizations can take to protect critical identity data before damage occurs.
1 week from now
This webinar focuses on why traditional patient zero detection no longer works in an AI driven threat landscape and what security teams must do instead. The discussion explains how attackers now use automation and AI to rapidly change techniques, making incident based defenses ineffective almost immediately. As a result, organizations can no longer rely on learning from the first victim and must assume they are a primary target from the start.
The session takes a technical look at how AI enabled adversaries launch large scale, polymorphic attacks and why proactive, behavior based defense models are becoming essential. Attendees will gain insight into modern research, defensive frameworks and strategies designed to improve resilience against fast evolving threats. The content is aimed at security teams looking to adapt their cyber defense approach for the AI era.
1 week from now
This masterclass focuses on how a Zero Trust architecture can reduce security costs while simplifying operations across users, branches, and cloud environments. Using Zscaler’s own internal Zero Trust journey, the session shows how moving to a cloud native approach helped eliminate unnecessary tools, streamline workflows, and improve overall security posture without adding complexity.
The discussion highlights practical strategies for applying Zero Trust in real environments, including ways to improve efficiency, strengthen protection, and scale securely as organizations grow. Attendees will gain clear insight into how Zero Trust can improve agility, reduce operational overhead, and deliver stronger returns by aligning security investments with business priorities.
2 weeks from now
Compliance expectations in 2026 are forcing organizations to prove real security readiness, not just policy alignment. This webinar focuses on how Zero Trust and XDR are becoming essential tools for meeting regulatory demands as frameworks like CRA, NIS2, and SEC disclosure rules place greater pressure on security leaders and executives.
The session explains why Zero Trust is now viewed as a regulatory requirement, how integrated security platforms simplify audits, and why insurers increasingly expect managed detection and response rather than endpoint coverage alone. Attendees will also gain clarity on incident response timelines and what rapid response truly means under modern compliance rules. This webinar is designed for organizations that need to turn compliance into a defensible security posture rather than a liability.
3 weeks from now
State sponsored cyber espionage campaigns targeting critical infrastructure are reshaping how organizations must defend their networks. This session focuses on advanced persistent threats exploiting vulnerabilities in routers, edge devices, and core network infrastructure to gain long term access and visibility across telecom, government, transportation, and military environments.
The discussion outlines practical ways to detect and disrupt these campaigns using advanced threat hunting and proactive detection techniques. Attendees will see how specialized tools can uncover APT activity that often bypasses traditional security controls, helping organizations reduce exposure to long term surveillance and protect critical systems.
4 days ago
This session focuses on how Barracuda SecureEdge brings security and network management together into a single, streamlined platform. The webinar highlights how organizations can simplify complex networks while strengthening protection at the edge through zero trust principles and tighter identity and access controls.
The discussion also covers improvements in SD WAN performance, integrated cloud security services and centralized management that reduce reliance on multiple tools. Attendees will see how these capabilities support distributed environments, improve visibility and make onboarding, monitoring and governance easier across the entire network.
4 days ago
Endpoint threats are evolving faster than ever, with attackers using automation and precision that overwhelm traditional detection based defenses. This webinar focuses on what modern endpoint protection truly requires and why clarity, context, and fast response now matter more than alert volume. The discussion highlights how manual investigation workflows contribute to alert fatigue, slower response times, and increased pressure on security teams.
The session brings together WatchGuard and GigaOm to examine where legacy endpoint approaches fall short and why complexity itself has become a major security risk. Attendees will gain a clear view of what effective EDR looks like today, including how AI, automation, and integrated tools are changing endpoint defense. Insights from the GigaOm Radar Report for EDR are also shared, along with practical guidance for making advanced endpoint protection achievable without sacrificing effectiveness.
4 days ago
Security teams face constant pressure to respond faster and more accurately as threats continue to evolve. This webinar focuses on the next generation of managed detection and response, where AI driven capabilities are combined with human expertise to improve threat detection and investigation outcomes. The session explains how expert supervised AI agents, trained on high quality security data, can dramatically reduce investigation time while maintaining high detection accuracy.
The discussion highlights how tailored detection algorithms surface advanced threats more quickly, how real time threat intelligence supports better decision making, and why a hybrid AI and human model is becoming essential for scalable security operations. Attendees will gain a clear view of how modern MDR approaches help organizations strengthen defenses without overwhelming security teams.
5 days ago
Improve wireless network performance using AIOps and zero touch configuration with Arista Wi-Fi. This webinar focuses on how automated optimization adapts to changing network conditions while giving administrators clear, actionable intelligence through a centralized management platform.
The session covers how centralized visibility supports application performance monitoring, remediation, location services and segmentation, along with simplified deployment for scalable environments. Attendees will also see how modern Wi-Fi 7, 6E and 6 access points support secure and reliable coverage through features such as intrusion protection, automatic RF tuning and cloud based management.
5 days ago
Accurate data visibility is becoming the foundation for successful AI adoption in network and security operations. This webinar examines how incomplete discovery tools and unreliable CMDBs create blind spots that slow innovation and increase operational risk across NetOps and SecOps environments. The discussion highlights why AI driven automation can only deliver real value when it is built on trusted, real time network data.
Experts from EMA and ServiceNow share insights from recent research on why data quality remains the biggest barrier to AI success, even as enterprises recognize its potential. The session explores how establishing a single source of network truth helps unify NOC and SOC teams, reduce blind spots and enable AI to support resilience, agility and more effective security operations.